CEA vacancy search engine

Automated Generation of Modular Protocol Implementations

Vacancy details

General information


The French Alternative Energies and Atomic Energy Commission (CEA) is a key player in research, development and innovation in four main areas :
• defence and security,
• nuclear energy (fission and fusion),
• technological research for industry,
• fundamental research in the physical sciences and life sciences.

Drawing on its widely acknowledged expertise, and thanks to its 16000 technicians, engineers, researchers and staff, the CEA actively participates in collaborative projects with a large number of academic and industrial partners.

The CEA is established in ten centers spread throughout France



Description de l'unité

Leti, Cea Tech's technological research institute, has a mission to create value and innovation with its industrial partners. It links fundamental research with the production of micro and nanotechnologies in order to improve everyone's quality of life. With a portfolio of 2,800 patents, Leti is shaping advanced solutions to improve the competitiveness of its industrial partners: large groups, SMEs or start-ups. Located in Grenoble (38), Leti has more than 1,800 researchers and offices in the US and Japan.
The LSOSP, Physical Object and System Security Laboratory, conducts R&D activities in the field of security and privacy technologies. It analyses and characterizes the risks to which electronic systems and components are exposed; it designs countermeasures based in particular on cryptographic techniques but also on modifications in the architecture of systems to integrate the necessary technologies (components, embedded codes, interfaces or communication protocols, etc.). It characterizes the effectiveness of countermeasures integrated into components, (communicating) objects and cyberphysical systems to resist attacks in their structure, functions or use.

Position description


Security against malicious damage



Job title

Automated Generation of Modular Protocol Implementations


Automated Generation of Modular Protocol Implementations

Contract duration (months)


Job description

Cryptographic protocols are omnipresent in networks. They are used to provide security for exchanges. They can be found in all types of networks, whether they are on the Internet, IoT-related, wired or wireless. In order to make them accessible to IoT applications, lightweight and reliable implementations are necessary. To achieve this, one possibility lies in the use of formal methods to express, verify safety properties. One difficulty is to preserve the proven properties from specifications to the code executed.
The objective of this internship is to provide a proof of concept to generate a communication protocol implementation based on specifications. These specifications will be written in a language that can be subject to formal security checks[1], in order to guarantee security properties of the implemented protocol. However, ensuring that the implementation is faithful to the specifications is an important issue in the security of cryptographic protocols. This code generation should allow cryptographic primitives (e.g. RSA, Elliptical curves (BEC, ...), Trivium) and hardware architecture (e.g. x86, ARM, hardware-related optimization) to be easily changed and/or integrated[2, 3] so that a protocol brick can be modular.
[1] S. Mödersheim. Algebraic Properties in Alice and Bob Notation. In Proceedings of Ares’09, pages 433–440. IEEE Xplore, 2009. Extended version: Technical Report RZ3709, IBM Zurich Research Lab, 2008

[2] NISTIR 8105, Report on Post-Quantum Cryptography, NIST 2016.

[3] Henry, Jasmine. "What is Crypto-Agility?". Cryptomathic. Retrieved 26 November 2018.


Methods / Means

Linux, C, Python

Applicant Profile

Scholar level : Engineer or Master's degree
Prerequisite : Cryptography, compilation et programming languages

Position localisation



Job location

France, Auvergne-Rhône-Alpes


17 avenue des martyrs 38000 Grenoble

Candidate criteria

Prepared diploma

Bac+5 - Master 2

Recommended training

Cryptography/Security oriented Master


Position start date